<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; cloud</title>
	<atom:link href="https://javacard.vetilles.com/tag/cloud/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Twitter going feudal on security</title>
		<link>https://javacard.vetilles.com/2013/10/04/twitter-going-feudal-on-security/</link>
		<comments>https://javacard.vetilles.com/2013/10/04/twitter-going-feudal-on-security/#comments</comments>
		<pubDate>Fri, 04 Oct 2013 14:46:07 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=873</guid>
		<description><![CDATA[I have recently experienced security issues with Twitter, as my account was in some way hacked. And I am not happy of the way Twitter handles this situation. First, here are the facts that I know: Two weeks ago, a got an e-mail from a colleague warning me that he just received a spam Direct [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I have recently experienced security issues with Twitter, as my account was in some way hacked. And I am not happy of the way Twitter handles this situation.</p>
<p>First, here are the facts that I know:</p>
<ul>
<li>Two weeks ago, a got an e-mail from a colleague warning me that he just received a spam Direct Message from me and that my account may have been hacked</li>
<li>I immediately looked at Twitter, just to find that another one of my followers had received spam</li>
<li>I then changed my password, and started to review the authrozations I gave</li>
<li>My authorizations were not looking good. Over the years, I had authorized many companies, usually those building Twitter clients. Some of them sported exotic names, and had the &#8220;read, write, and direct message&#8221; privileges.</li>
<li>I removed privileges to all these guys, and many more, and only kept the ones that I use daily and are issued by supposedly &#8220;good&#8221; companies, like Twitter and HTC, and service that I had used recently, such as Pullquote.</li>
<li>At this stage, I was hoping that this minimal work was sufficient to solve this hack thing (Disclosure: I am currently recovering from eye surgery, and at that time, my vision was very bad).</li>
</ul>
<p>Well, I am not sure that these measures were sufficient to stop hackers, but none of my friends/followers have complained about receiving direct messages after that day. And knowing the proportion of security people in this crowd, this makes me feel quite good.</p>
<p>But then, Twitter kicked in:</p>
<ul>
<li>Two hours after I fixed things, I received a &#8220;Your password has been reset&#8221; e-mail from Twitter, explaining me that my account may have been hacked, and that I should change my password. That sounded about right, so I changed my password (again), as instructed.</li>
<li>The next day, I received the same e-mail again: &#8220;Twitter has reset your password&#8221;. That got me a bit worried, so I took a few additional steps. First, I considered the possibility of spam: instead of clicking on the password reset link directly, I copy-pasted it into the browser and hand-typed the https://twitter.com/ part, just in case. I also made a more drastic review of my authorizations, only keeping the clients on my phone and iPad.</li>
</ul>
<p>Everything went fine for 5 days. And just as I was thinking that the issue was over, I got another &#8220;Your password has been reset&#8221; e-mail from Twitter. This time, it was just not fun, and I had recovered a bit, so I investigated a bit more.</p>
<ul>
<li>Since I knew that some contacts had received direct messages from me, I checked my direct messages, and no spam appeared there. This is strange, since my non-spam DMs sent from authorized clients do appear there.</li>
<li>I checked all the links provided in the e-mails, and I have not been able to find any useful information, or any way to ask for details.</li>
<li>I Google&#8217;d the problem, found other people with the same problem (or worse), but no clue of a solution.</li>
<ul>
<p>So, in the end, I know that (1) my account has been hacked about two weeks ago, (2) Twitter noticed it somehow and reset my password, (3) Twitter then found two more reasons to reset my password in a week, and (4) the only thing that I can do is hope that this is over, because I don&#8217;t have a way to get any additional information about the problem.</p>
<p>So, I do believe that this is an instance of what Bruce Schneier calls <a href="https://www.schneier.com/blog/archives/2013/06/more_on_feudal.html" class="liexternal">feudal security</a>. The Lords of Twitter provide me some security in exchange of me using their service and reading a few ads, and as a good serf, I am not allowed to ask any question or participate to the defense.</p>
<p>This is a bit scary to me. I like the Twitter service, and I am a rather happy user, exchanging information on this social network. But what am I to do if the Twitter police keeps resetting my password? How do I know whether this is a mistake, or I am really getting hacked? In such a situation, I guess that the only way would be to either stop using Twitter, or get a new handle. None of these solutions look good to me.</p>
<p>So, I can only hope that the Lords of Twitter protect me well, that the Prince of Facebook does the same. But mixing this kind of desperate hope with my professional hope that the Internet of Things becomes a reality is not reassuring. Feudal security is not a good future.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2013/10/04/twitter-going-feudal-on-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 2: NFC authentication in the cloud</title>
		<link>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/</link>
		<comments>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/#comments</comments>
		<pubDate>Thu, 20 Sep 2012 10:15:51 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/</guid>
		<description><![CDATA[This is a presentation from Gemalto&#8217;s Maurizio Divona, delivered by her colleague Virgine Galindo. It starts from cloud authentication, where strong authentication typically happens with tokens that need to be distributed by service providers. The idea is of course to use NFC technology to simplify this, which would allow the use of strong authentication in [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is a presentation from Gemalto&#8217;s Maurizio Divona, delivered by her colleague Virgine Galindo. It starts from cloud authentication, where strong authentication typically happens with tokens that need to be distributed by service providers.</p>
<p>The idea is of course to use NFC technology to simplify this, which would allow the use of strong authentication in more situations. The idea is here to have credentials in mobile phone applications, and to use it in a NFC transaction with a PC. Here, the service provider delivers a user credential in the phone, or delegates this to a TSM. Because the credential will be stored in the secure element, it is possible to emulate all kinds of hardware tokens on the mobile phone, with a similar security level.</p>
<p>This is an interesting way to introduce new applications in the NFC secure element, especially ifhy can make our lives easier.  Of course, this assumes that there actually is an infrastructure ready for downloading content to it, and business models in place to actually get the credentials in an efficient way to the secure element. So, some way to go here.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-nfc-authentication-in-the-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 1: Now, cloud TSM</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 13:21:19 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/</guid>
		<description><![CDATA[A presentation by Thian Yee, from Cassis (a Safran Morpho company). TSMs are moving from 1-1 relationships to n-n relationships. The challenges they face are related to customer experience, which must be very simple and consistent; flexibility and scalability, as demand is very variable, depending on product launches, with unsustainable peak demand; and finally, regulatory [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A presentation by Thian Yee, from Cassis (a Safran Morpho company). TSMs are moving from 1-1 relationships to n-n relationships. The challenges they face are related to customer experience, which must be very simple and consistent; flexibility and scalability, as demand is very variable, depending on product launches, with unsustainable peak demand; and finally, regulatory requirements, time-to-market and cost.</p>
<p>Cassis is now trying to offer TaaS (TSM as a service, of course), where the TSM performs the essential processing, and also streamlines it, for instance by leaving the most sensitive data at the bank, and only sending crypto requests to the bank.</p>
<p>In the future, they envision many TSMs in the cloud, where collaboration will be made easier. Of course, there are things to consider to make that happen, including of course some action on regulatory bodies, who maynnot like this move to an uncontrolled cloud.</p>
<p>I have always thought that this kind of activity was difficult today, because cloud is about elasticity, and Hardware Security Modules (typically used by TSMs to store sensitive data) are not all that elastic. Of course, proposing to keep the sensitive data on the bank&#8217;s server is one way to address that, but it also shifts some responsibility from the TSM back to its customer, which is a bit strange.</p>
<p>Nevertheless, I get this feeling that a TSM cloud needs to be really secure. This would eiher mean that someone builds a TSM cloud and shares it with others (Gemalto, do you want to be the Amazon of TSMs?), or that someone builds a cloud for secure applications, possibly beyond TSM. I am sure that there are other reasons to use a secure cloud, so this may be the way. Anyway, this is interesting to follow, because leveraging the cloud&#8217;s properties will give a competitive edge to any TSM.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-now-cloud-tsm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 1: Cloud security panel</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-cloud-security-panel/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-cloud-security-panel/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 11:06:08 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-cloud-security-panel/</guid>
		<description><![CDATA[A few bits from Helmut Scherzer, from G&#038;D: The digital natives don&#8217;t want to escape the Web. We went from visual Web to the social Web, and they will go to the next step with the semantic web, where knowledge is well classified and organized. big companies are very big. The CEO of Toshiba estimatee [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A few bits from Helmut Scherzer, from G&#038;D:</p>
<ul>
<li>The digital natives don&#8217;t want to escape the Web. We went from visual Web to the social Web, and they will go to the next step with the semantic web, where knowledge is well classified and organized.</li>
<li>big companies are very big. The CEO of Toshiba estimatee that it would take them 10 years to build the same computing power than Goole. Quite an advantage. Plus, of course, Google has a lot of your data, and their CEO told that people are waiting for Google to tell them what to do next.</li>
<li>Privacy is not absolute. google Street View made a privacy scandal in Germany, but as Audi introduced Street View in cars, people became interested in seeing their home on it. You can buy people beyond privacy.</li>
<li>There is http://pleaserobme.com/ service that is really a nice tool to show how people tell everybody that they are far away from home (no, I am not far away, and there is someone at home)</li>
<li>Babyboomers wanted to improve the world and own cars, Generation X want to fin themselves and have been used to computers, and digital natives have grown in computers, and this is true in all aspects of their life.</li>
<li>The network has become a moral instance, and pressure from social network is increasing. Network is also not forgiving, as everything gets recorded, and this does not look like a good evolution (especially if you don&#8217;t conform with the net morals). </li>
</ul>
<p>He finished with a wish list for the future, from which my favorite item was &#8220;security without doing anything for it&#8221;.</p>
<p>Next speaker is Peter Hustinx, European Data Protection Supervisor, about making data protection more effective and consistent across EU. Of course, he talks about upcoming new regulations that would address some issues outlined just before.</p>
<ul>
<li>The first one is to put the user in control, with the right to access, remove data, being forgotten, and much more.</li>
<li>Next thing is to make providers responsible, with mandatory assessments./li>
<li>Effective supervision is required, with more powerful national organizations, and more cooperation between countries</li>
<li>Finally, Europe is only one part of setting up a Global Privacy framework, by setting up instruments for adequate protection, and of course, more cooperation, for instance, between the EC and the FTC.</li>
</ul>
<p>Next speaker is Joerg Borchert, from Infineon and Trusted Computing Group, rapidly presenting the TCG, including the following statement:</p>
<ul>
<li>The cloud means the mix of trust and multi-tenancy, with a root in hardware at the server level.</li>
</ul>
<p>Final speaker is Detlef Houdeau, from Eurosmart and Infineon, talking about a whitepaper recently deployed on cloud security.</p>
<ul>
<li>Cloud security is a combination of computing security, network security, and information security. Very different points of views.</li>
<li>There are many actors around cloud security, both at the European level and at the industry level, but these efforts don&#8217;t focus on the cloud issues. Thisleads to risks, such as the lackof EU guidelines.</li>
<li>Eurosmart recommends to work on privacy, security, and data protection</li>
</ul>
<p>Well, this conference leaves me frustrated, as I didn&#8217;t get the same impression of consistency as in the first panel. The speakers sounded a bit like everybody is proposing solutions without listening much to the others. Also, I am not convinced that we have done the work of linking the societal aspects of the cloud, as expressed in the first talk, with clear societal objectives. Instead, we are jumping directly to technical proposals. The legal framework may make the link, by defining incentives to develop the &#8220;right&#8221; technological answers. Still, privacy by design is a nice idea, that we have to make flexible enough to match the lifestyles of our digital natives. We of course want to avoid falling into Big Brother&#8217;s arms, but we also have to make sure that we create an environment in which we can be free to share things freely. And that is a challenge.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-cloud-security-panel/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cloud (mis)authentication</title>
		<link>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/</link>
		<comments>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/#comments</comments>
		<pubDate>Tue, 07 Aug 2012 10:17:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cloud]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=814</guid>
		<description><![CDATA[I just read an amazing and chilling story about cloud authentication and hacking. Some guy just lost a big chunk of his digital life, because cloud authentication is not secure, or maybe even more, because cloud authentication is not enough standardized/regulated/watched. In his case (read the story, I won&#8217;t repeat it here, and it is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I just read <a href="http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/" class="liexternal">an amazing and chilling story</a> about cloud authentication and hacking. Some guy just lost a big chunk of his digital life, because cloud authentication is not secure, or maybe even more, because cloud authentication is not enough standardized/regulated/watched. In his case (read the story, I won&#8217;t repeat it here, and it is definitely worth it), the main flaw comes from the fact that Amazon identifies your credit cards on file by the 4 last digits, and Apple requires these very digits to authenticate an iCloud user.</p>
<p>What? No standard on the digits that may/may not be disclosed? I couldn&#8217;t get the facts from EMV or others (if you know, I am interested), but I noticed that although the digits printed on most of my (French) credit card receipts are the same (9 digits following the pattern xxxx xx00 0000 000x), some of my receipts include the infamous 4 last digits, and an Italian receipt includes the 8 first digits. Just with these few examples, I would say that, either there is no standard about which digits to show/hide, or the standard is not applied anyway. It is not difficult to guess that this is most likely not better on Internet, and not only at Amazon.</p>
<p>On this particular issue, I would blame Apple, because the information they require to grant access to an iCloud account is not sufficient (e-mail, billing address, partial credit card number). In particular, Apple allows you to forget the answers to your security questions, which doesn&#8217;t sound very good.</p>
<p>Mat Honan recommends in his paper to move beyond passwords and to adopt two-factor authentication. This sounds sensible, and I approve this move. However, in the present case, how useful would that be? If a cloud vendor uses two-factor authentication, then there must be a procedure for lost tokens. And this procedure better be good.</p>
<p>Not that it&#8217;s that complicated to design a procedure that works. We can for instance rely on existing infrastructure, like the Post Office. You can request your password to be snailmailed to you in a Certified Letter, which will require in-person delivery at your home or authentication with a government ID at the post office. This works perfectly against hackers, because they are not good at physical actions that require real presence.</p>
<p>However, this has some trade-offs: delay and price. Changing a password online is about free and instantaneous, whereas sending a physical letter has a cost, and it will take at least one day. I am ready to accept this delay and this cost to protect my most important cloud accounts, because I have some understanding of the risks. Not everybody does.</p>
<p>This actually represents an interesting role for two-factor authentication tokens: end-user education. Because they are a physical object, any user will understand that a new one needs to be sent if it is lost or compromised. And although they won&#8217;t be happy, they may/should/will associate the cost and delay associated to the token replacement to the security of their account.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/08/07/cloud-misauthentication/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Amazon does little shifts</title>
		<link>https://javacard.vetilles.com/2011/03/30/amazon-does-little-shifts/</link>
		<comments>https://javacard.vetilles.com/2011/03/30/amazon-does-little-shifts/#comments</comments>
		<pubDate>Wed, 30 Mar 2011 06:27:25 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[cloud]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=717</guid>
		<description><![CDATA[So, Amazon is launching an online music service, where you can store your music on their servers and then stream it to your devices. This is impressive, and as mentioned by some, we are getting closer to the mythical GDrive. Amazon&#8217;s announcement gives us a very cheap online storage: by just buying one album on [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>So, Amazon is <a href="http://www.amazon.com/b/ref=amb_link_355091782_4?ie=UTF8&#038;node=2658409011&#038;pf_rd_m=ATVPDKIKX0DER&#038;pf_rd_s=center-2&#038;pf_rd_r=0J3XBYRHAC5ZTB9ABCZF&#038;pf_rd_t=101&#038;pf_rd_p=1291940422&#038;pf_rd_i=163856011" class="liexternal">launching</a> an online music service, where you can store your music on their servers and then stream it to your devices. This is impressive, and as mentioned <a href="http://www.fabcapo.com/2011/03/did-amazon-just-launch-mythical-gdrive.html" class="liexternal">by some</a>, we are getting closer to the mythical GDrive. Amazon&#8217;s announcement gives us a very cheap online storage: by just buying one album on Amazon&#8217;s MP3 store, you get 20GB of free storage. Even if you buy a $5 album (cheaper ones are available), that about $0,25 per gigabyte per year, which is cheap.</p>
<p>Amazon started with the books, as all my Kindle books are stored online, with all the information, and can be instantly retrieved anywhere, anytime. They are now moving to music, which consumes significantly more storage and bandwidth. Video is probably next. Now, will they stop there, or will they move into other types of content, like office documents?</p>
<p>Another interesting thing is the mobile client. We know that Amazon is a friend of Android, especially since they have launched their own Android application store. However, they have gone a bit further here, since the Amazon Cloud Player is only available for Android for the launch. No iOS version at this time, which is quite a bold statement for a product that launched only in the U.S. Of course, an iOS version must be somewhere in the works, but Amazon knows that, eventually, Apple is not going to like their competition. After all, loyal iTunes customers can now upload all their iTunes music into Amazon&#8217;s Cloud, and stream it. Maybe an indication why they can only do that on an Android device: It&#8217;s a free world. </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/03/30/amazon-does-little-shifts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Live from Oracle OpenWorld: Cloud and Identity</title>
		<link>https://javacard.vetilles.com/2010/09/22/live-from-oracle-openworld-cloud-and-identity/</link>
		<comments>https://javacard.vetilles.com/2010/09/22/live-from-oracle-openworld-cloud-and-identity/#comments</comments>
		<pubDate>Wed, 22 Sep 2010 20:42:49 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=625</guid>
		<description><![CDATA[At midday, it is time for a little break in my smart card day, and go listen to an Oracle OpenWorld session. I might as well leverage today&#8217;s professional look to blend better into OOW&#8217;s suit-dominated crowds. The funny thing is that every OOW session I have seen ended up turning into a blatent advertising [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>At midday, it is time for a little break in my smart card day, and go listen to an Oracle OpenWorld session. I might as well leverage today&#8217;s professional look to blend better into OOW&#8217;s suit-dominated crowds. The funny thing is that every OOW session I have seen ended up turning into a blatent advertising session for some Oracle product. No exception on that session, which was about Identity in the cloud. Here are a few highlights of that session (before the advertising part), provided about raw:</p>
<p>74% of people are worried about security in the cloud, in particular because of the loss of control that comes from moving your applications into Software-as-a-Service, or even only when you are only getting to Infrastructure-as-a-Service. But, the worries come from the classic security approach with perimeter defense: your security is based on high walls keeping people out.</p>
<p>Cloud computing introduces a disruption, but it only means that perimeter defnse has become obsolete, and that other things are required. Security now needs to be secured by policies, not only based on the topology of the network.</p>
<p>For an SME, the perceived risks (from ENISA) include vendor/service lock-in (am I stuck forever with Amazon?), malicious insiders (who is accessing my data?), management interface compromise (could someone impersonate my IT manager?), or legal risks (where is my data stored?). Another point is that shared services can be more attractive to hackers, because they can be granted access to several actors.</p>
<p>Of course, according to the speaker, identity is the solution. His main idea is to extend the (Oracle) identity management system used in the enterprise into the cloud. For instance, for federation, SAML-based federations can be used to get into the cloud. </p>
<p>Privileged account management is very important. Cloud services come with &#8220;superuser&#8221; accounts that have the ability to completely manage a service. These accounts should only be accessible through a mechanism that can track, monitor and control access.</p>
<p>For other accounts, account lifecycle management can be an extension of the standard enterprise system.</p>
<p>Something very interesting is to use claims-based identity. Claims-based provisioning can get the necessary identity information through a single SAML token, without having to directly connect to the enterprise systems. More importantly, identity assertions (such as attributes and roles) can be used for authorization purposes. However, this is not necessarily accepted by all cloud providers. When supported, XACML allows enterprises to export their internal policies to the cloud service provider.</p>
<p>Ultimately, the enterprise can become an Identity Services Provider, leveraging the IAM services available internally to cloud applications, or to partner applications outside of the enterprise. The objective is here to promote a loose coupling between the services and the low-level authentication.</p>
<p>Then, we get into Oracle advertising, reminding that identity management is part of Oracle&#8217;s offer, and provides all the services mentioned previously.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/22/live-from-oracle-openworld-cloud-and-identity/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Live from JavaOne: Identity for Services in the Cloud</title>
		<link>https://javacard.vetilles.com/2010/09/22/live-from-javaone-identity-for-services-in-the-cloud/</link>
		<comments>https://javacard.vetilles.com/2010/09/22/live-from-javaone-identity-for-services-in-the-cloud/#comments</comments>
		<pubDate>Wed, 22 Sep 2010 04:16:33 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=617</guid>
		<description><![CDATA[The next talk was about Identity for Services in the Cloud, by Jiandong Guo and Symon Chang. Their focus was to promote their favorite solution, which has been around for a while, and whose objective is to clearly separate authentication from authorization using standards. Their scheme is quite classical: The client gets a SAML token [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The next talk was about Identity for Services in the Cloud, by <a href="http://blogs.sun.com/trustjdg/" class="liexternal">Jiandong Guo</a> and Symon Chang. Their focus was to promote their favorite solution, which has been around for a while, and whose objective is to clearly separate authentication from authorization using standards. Their scheme is quite classical:</p>
<ul>
<li>The client gets a SAML token from Security Token Service (STS) using WS-Trust protocol.</li>
<li>The client puts the SAML token into the message.</li>
<li>The server verifies SAML token and makes authentication and authorization decision.</li>
</ul>
<p>Of course, the actual authentication occurs in the first step, between the client and the STS. After that, it is all a question of trust between the server and the STS that has generated the SAML token. With this scheme, we can avoid direct authentication between the client and the server.</p>
<p>Nothing really new, but I really liked their explanation, based on a parallel with the JavaOne conference badges. When you arrive to JavaOne, you first go to registration. There, you need to prove your identity by showing an officla ID to the attendant, who will then prepare the badge that grants you access to the conference. In addition, the attendant will add some ribbons that describe your specific attributes. For instance, I have the &#8220;Speaker&#8221; and &#8220;Alumni&#8221; ribbons. These ribbons are attributes that complement your basic identification, and allow you to get authorized in some circumstances. For instance, I can get into the speaker lounge, and I got an alumni jacket.</p>
<p>The conference badge acts like a SAML token: the basic badge shows that you have been authenticated, and the additional attributes describe some of your characteristics. </p>
<p>The model can be slightly enhanced by using two levels of STS. The idea is that the user will get a SAML token from a local STS, and use that token. The server will then get that token to another STS (local to the server), and get in return another SAML token, suited to its needs. With this scheme, both the client and the server only need to trust a single STS. The business of trust is entirely delegated to the two STS&#8217;s, who need to share each other. This clearly separates the trust issues from the rest.</p>
<p>Interesting presentation, but I still don&#8217;t feel enlightened about identity in the cloud. There is another session tomorrow on the topic, I hope that I will be thrilled.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/22/live-from-javaone-identity-for-services-in-the-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
